You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
excerpt: "Run your own Vestauth server in a single command."
8
+
excerpt: "Run your own Vestauth server step by step and keep agent identity infrastructure under your control."
9
9
---
10
10
11
-
Run your own Vestauth server in a single command.
11
+
Vestauth does not require a central auth provider.
12
12
13
-
Blog post coming soon.
13
+
At its core, Vestauth is just HTTP plus public key cryptography:
14
+
15
+
* agents generate keys locally
16
+
* agents sign requests
17
+
* tools verify signatures
18
+
* public keys are published via `.well-known`
19
+
20
+
That means you can run your own Vestauth infrastructure when you want tighter control over discovery, storage, hosting, and operations.
21
+
22
+
This guide walks through self-hosting the built-in Vestauth server step by step.
23
+
24
+
## Why self-host Vestauth?
25
+
26
+
Vestauth works great with the default hosted infrastructure, but there are good reasons to run your own:
27
+
28
+
***Control your infrastructure**: keep registration, discovery, and key serving under your domain.
29
+
***Compliance / data residency**: run on your own cloud, region, or network boundaries.
30
+
***Custom operations**: use your own Postgres, observability, backups, and deployment pipeline.
31
+
***Private environments**: support internal agents and internal tools.
32
+
***Future flexibility**: customize trust rules, federation, and deployment topology as your agent ecosystem grows.
33
+
34
+
Like I wrote in the "run your own vestauth infrastructure" post: Vestauth is just HTTP. You're running an agent identity service that registers agents, stores public keys, and serves them for verification.
35
+
36
+
## What you are setting up
37
+
38
+
When you self-host the Vestauth server, you are running the infrastructure that:
Or hit one of your own tools that calls `vestauth.tool.verify(...)`.
176
+
177
+
The key point is this: the request is signed locally by the agent, and tools verify it using public keys discovered from your self-hosted infrastructure.
178
+
179
+
## What changes when you self-host?
180
+
181
+
The cryptography and standards stay the same.
182
+
183
+
What changes is the infrastructure under the hood:
184
+
185
+
***discovery domain** is yours
186
+
***database** is yours
187
+
***deployment + uptime** are yours
188
+
***network boundaries** are yours
189
+
***operational controls** are yours
190
+
191
+
You still get the same Vestauth developer experience:
192
+
193
+
*`vestauth agent init`
194
+
*`vestauth agent curl`
195
+
*`vestauth tool.verify(...)`
196
+
197
+
But the trust and hosting boundary is now under your control.
198
+
199
+
## Production notes (important)
200
+
201
+
### 1) Configure wildcard DNS
202
+
203
+
You must configure a wildcard DNS record for `*.${HOSTNAME}`.
204
+
205
+
Example:
206
+
207
+
* If `HOSTNAME=vestauth.yourapp.com`
208
+
* Add wildcard DNS for `*.vestauth.yourapp.com`
209
+
210
+
This is required for `.well-known` discovery in the web-bot-auth architecture because agents resolve to subdomains under your host.
211
+
212
+
### 2) Use HTTPS in production
213
+
214
+
Use HTTPS for your public Vestauth hostname in production. Local `http://localhost` is fine for development.
215
+
216
+
### 3) Run managed Postgres (recommended)
217
+
218
+
Use a managed Postgres provider (Supabase, RDS, etc.) for backups, failover, and operations unless you explicitly want to operate Postgres yourself.
219
+
220
+
### 4) Add normal service hardening
221
+
222
+
Treat the Vestauth server like any production HTTP service:
223
+
224
+
* logging and metrics
225
+
* backups
226
+
* timeouts
227
+
* health checks
228
+
* deploy rollbacks
229
+
230
+
## Who should self-host?
231
+
232
+
Self-hosting is a strong fit if you are:
233
+
234
+
* building an internal agent platform
235
+
* shipping a product that needs your own trust domain
236
+
* operating in regulated or enterprise environments
237
+
* standardizing agent identity across multiple services
238
+
239
+
If you are just exploring Vestauth, start with the hosted defaults first. You can migrate to self-hosting later without changing the underlying HTTP Message Signatures model.
240
+
241
+
## Closing
242
+
243
+
Vestauth is designed so you can start simple and grow into your own infrastructure.
244
+
245
+
If you self-host, you are not opting out of the standard. You are adopting it more fully by running the identity, key discovery, and trust boundary yourself.
246
+
247
+
That gives you a cryptographic agent auth layer you can run, audit, and operate on your own terms.
0 commit comments